Figure 6From: Time-Frequency and Time-Scale-Based Fragile Watermarking Methods for Image AuthenticationTFDs of the extracted watermark for (a) a JPEG compression attack, (b) a scaling attack (factor 1. 1) (c) a translation attack, (d) a rotation attack ( rotation), and (e) a cropping attack.Back to article page